The perfect time to study for security professional certification exams
Want to get ready for a professional security certification exam? We’ve created paths and courses to help you build the skills you’ll need to ace it—and we continually review them to ensure they align with any new objectives released by certifying bodies.
Available paths
Certified Information Systems Security Professional (CISSP)
The industry renowned CISSP certification by (ISC)² is the top technology certification for security professionals on the Pluralsight Technology Index.
Kevin Henry guides you through all eight domains on the certification exam outline with in-depth teaching on the foundational knowledge you’ll need to effectively design, engineer, manage and lead the security posture of an organization.
Certified Ethical Hacker (CEH)
Ethical Hacking is our second-most popular certification on the Pluralsight Technology Index. This series provides the knowledge you’ll need to ethically and effectively discover and exploit vulnerabilities in systems, by assuming both the mindset and toolset of an attacker. Through learning how systems are attacked you’ll gain an understanding of how best to protect systems and improve your organization’s security.
Expert Dale Meredith covers the core exam for this professional certification (CEHv10).
CompTIA Security+
These courses will also help you prepare for the CompTIA Security+ SY0-501 certification exam. The “Threats, Attacks, and Vulnerabilities” course has been our most popular certification course for security professionals for the last 12 months.
Christopher Rees teaches you how to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities and operate with an awareness of applicable policies, laws and regulations.
CompTIA Pentest+
In this series, you’ll learn the penetration testing methodology to conduct information gathering and vulnerability analysis, as well as the management skills necessary to determine the resilience of a network against attacks. You’ll learn to plan, scope and manage weaknesses, not just exploit them. These courses will also help you prepare for the CompTIA PenTest+ PTO-001 certification exam.
Dale Meredith takes a deep dive into the skills required for certification, so you can be both exam-ready and real-world-ready!
CompTIA Cybersecurity Analyst+
In this series, you’ll learn how to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization. We’re currently working on the new exam objectives released in February 2020 for the CompTIA Security+ (Exam SY0-601) certification.
Dale Meredith covers the core exam for this professional certification and continues his in-depth teaching to guide you to mastery.
Certified Network Defender (CND)
The EC-Council’s Certified Network Defender (312-38) examination focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.
Daniel Lachance explains the true construct of data transfer, network technologies and software technologies—helping you to understand how networks operate, what software is automating and how to analyze the subject material.
Certified Information Security Manager (CISM)
CISM is a certification offered by ISACA that validates your knowledge and expertise in managing enterprise information security teams. There are more than 46,000 holders of this certification globally.
Bobby Rogers will build your expertise in information security governance, program development and management, incident management and risk management.
Certified Information Systems Auditor (CISA)
CISA issued by ISACA is the global standard for professionals who have a career in information systems—in particular, auditing, control and security.
Kevin Henry will help you become familiar with the 2019 CISA Job Practice Areas for this exam. You’ll learn how to plan and conduct audit services that conform to your enterprise’s standards and gain an understanding of how to identify and recommend practices that actively address cyber risk.
Certified in Risk and Information Systems Control (CRISC)
Awarded by ISACA, the CRISC qualification can be earned by those who identify and manage risks through the development, implementation and maintenance of information systems controls.
Kevin Henry will help you build a foundational knowledge of information systems risk management and establishing an information security framework.
Certified Cloud Security Professional (CCSP)
We’re in the process of building out the courses for this (ISC)² certification, which is ideal for security professionals responsible for applying best practices to cloud security architecture, design and more.
Lyron Andrews and Kevin Henry will help you build the foundational skills needed to design, manage and secure data, applications and infrastructure in the cloud.
Certified Secure Software Lifecycle Professional (CSSLP)
In this series, you’ll learn foundational security concepts and skills for application development and the software development lifecycle.
Kevin Henry guides you through the essential components of the software development lifecycle.
Systems Security Certified Practitioner (SSCP)
The (ISC)² Systems Security Certified Practitioner (SSCP) is an excellent entry-level information security certification, and the ideal precursor for the greatly sought-after Certified Information Systems Security Professional (CISSP).
Kevin Henry will take you through the foundational knowledge needed to implement and maintain strong security practices, so you can help your organization defend itself against security threats and attacks.
CCNP Security
The CCNP Security certification remains, but has now been fully fleshed out with Cisco’s security product offerings. More concentration exam coverage is on the way!
Craig Stansbury walks you through everything you’ll need to know about implementing Cisco security solutions. You’ll get a sampling of just about everything Cisco has to offer, making it easy to then dive into the certification’s concentration exams.
Cisco SCOR (350-701) for CCNP Security
Martin Brown takes you deep into VPN implementation and operation in his coverage of the Implementing Secure Solutions with Virtual Private Networks (SVPN) concentration exam.
Microsoft Azure Security Engineer (AZ-500)
Azure Security Engineers implement security controls and threat protection, manage identity and access, protect data, applications and networks in cloud and hybrid environments as part of end-to-end infrastructure.
Tim Warner, Neil Morrissey and Michael Teske explain how to manage identity and access in the Microsoft Azure environment in order to control exactly who in your organization will be able to access important applications and data.
Other recently enhanced paths
Here are a number of paths we’ve recently added new courses to, so you can build new cybersecurity skills or hone your existing skills.
Upcoming paths
We have some exciting new course and path content coming soon to our platform! Here’s some of what to look out for:
Penetration testing fundamentals with the Metasploit Framework
Enterprise Security Monitoring with Suricata
A new Elastic (ELK Stack) series from fundamentals through to threat hunting
Information Security Testing and Auditing with Nmap
Testing Web Application Information Security with Burp Suite
Vulnerability Analysis with Nessus
Splunk Enterprise Security Administration
Certificate Cloud Security Knowledge (CCSK) by Cloud Security Alliance certificate preparation course
Blue Team tools
Certified Threat Intelligence Analysis (C|TIA) by EC-Council certificate preparation course
Cisco Certified CyberOps Associate
5 keys to successful organizational design
How do you create an organization that is nimble, flexible and takes a fresh view of team structure? These are the keys to creating and maintaining a successful business that will last the test of time.
Read moreWhy your best tech talent quits
Your best developers and IT pros receive recruiting offers in their InMail and inboxes daily. Because the competition for the top tech talent is so fierce, how do you keep your best employees in house?
Read moreTechnology in 2025: Prepare your workforce
The key to surviving this new industrial revolution is leading it. That requires two key elements of agile businesses: awareness of disruptive technology and a plan to develop talent that can make the most of it.
Read more